SDCoR: software defined cognitive routing for internet of vehicles

C Wang, L Zhang, Z Li, C Jiang - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
The Internet of Vehicles (IoV) is a subapplication of the Internet of Things in the automotive
field. Large amounts of sensor data require to be transferred in real-time. Most of the routing …

Motion-Fi: Recognizing and counting repetitive motions with passive wireless backscattering

N Xiao, P Yang, Y Yan, H Zhou… - IEEE INFOCOM 2018 …, 2018 - ieeexplore.ieee.org
Recently several ground-breaking RF-based motion-recognition systems were proposed to
detect and/or recognize macro/micro human movements. These systems often suffer from …

An efficient high throughput FPGA implementation of AES for multi-gigabit protocols

U Hussain, H Jamal - 2012 10th International Conference on …, 2012 - ieeexplore.ieee.org
Due to the requirement of high throughput architecture for encrypted channels, an efficient
implementation of hardware is needed. This can be achieved by using smart utilization of …

Near-optimal and practical jamming-resistant energy-efficient cognitive radio communications

P Zhou, Q Wang, W Wang, Y Hu… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
This paper studies the problem of jamming-resistant spectrum aggregation and access
(SAA) for energy-efficiency (EE) cognitive radio communications. We consider various …

The role of enterprise architecture in healthcare-IT

K Ahsan, H Shah, P Kingston - 2009 Sixth International …, 2009 - ieeexplore.ieee.org
As far as enterprise architecture is a strategic planning tool, Main objective of architecture is
to define the layout of organizational components and relationship among them in order to …

Back-guard: Wireless backscattering based user sensing with parallel attention model

XY Li, M Yin, Y Zhang, P Yang, C Wan… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
With the rapid advance of wireless sensing techniques, it becomes possible to provide a fine-
grained user activity tracking service at home and office. Such a technique is of broad …

Toward optimal adaptive wireless communications in unknown environments

P Zhou, T Jiang - IEEE Transactions on Wireless …, 2016 - ieeexplore.ieee.org
Designing efficient channel access schemes for wireless communications without any prior
knowledge about the nature of environments has been a very challenging issue, in which …

Opportunistic channel-aware spectrum access for cognitive radio networks with interleaved transmission and sensing

SS Tan, J Zeidler, B Rao - IEEE transactions on wireless …, 2013 - ieeexplore.ieee.org
Opportunistic spectrum access in a cognitive radio network has been a challenge due to the
dynamic nature of spectrum availability and possible collisions between the primary user …

Distributed scheduling in MIMO empowered cognitive radio ad hoc networks

C Gao, S Chu, X Wang - IEEE transactions on mobile …, 2013 - ieeexplore.ieee.org
Two fast growing technologies, MIMO and cognitive radio (CR), can both effectively combat
the transmission interference among links and thus increase the network throughput. MIMO …

An improved e-mail security protocol

B Schneier, C Hall - Proceedings 13th Annual Computer …, 1997 - ieeexplore.ieee.org
Current e-mail security systems base their security on the secrecy of the long-term private
key. If this private key is ever compromised, an attacker can decrypt any messages-past …